Firefox 149 Released With Patch for 37 Vulnerabilities that Enables Remote Attacks

Mozilla released Firefox 149 on March 24, 2026, delivering one of the largest security advisories in the browser’s recent history, addressing 37 vulnerabilities spanning memory corruption, sandbox escapes, use-after-free flaws, and remote code execution risks across multiple browser components.

Published under advisory MFSA 2026-20, the security update carries an overall “high” impact rating from Mozilla. The 37 CVEs are distributed across three severity tiers: 16 rated high, 17 rated moderate, and 4 rated low.

Among the most alarming findings are six confirmed sandbox escape vulnerabilities, a class of flaw that allows attackers to break out of Firefox’s isolation boundary and execute arbitrary code directly on the host system.

Firefox High-Severity Vulnerability

The most critical vulnerabilities fixed in this release include multiple memory corruption and sandbox escape issues. CVE-2026-4684 involves a race condition and use-after-free in the Graphics: WebRender component, reported by Oskar L.

CVE-2026-4687, CVE-2026-4688, CVE-2026-4689, and CVE-2026-4690 are all sandbox escape flaws found in the Telemetry, Disability Access APIs, and XPCOM components, each carrying a high severity rating and reported by researcher Sajeeb Lohani.

CVE-2026-4698, a JIT miscompilation bug in the JavaScript Engine, was discovered by maxpl0it working with Trend Micro’s Zero Day Initiative and poses a high risk of arbitrary code execution.

Three memory safety rollup vulnerabilities, CVE-2026-4720, CVE-2026-4721, and CVE-2026-4729, round out the high-severity tier, with Mozilla noting that “some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.”

AI-Assisted Vulnerability Discovery

A notable milestone in this advisory is the contribution from a research team, Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger, who used Claude from Anthropic to discover six vulnerabilities.

These include CVE-2026-4702 (JIT miscompilation), CVE-2026-4723 (use-after-free in the JavaScript Engine), CVE-2026-4724 (undefined behavior in Audio/Video), and multiple WebRTC Signaling issues. This marks a notable milestone as the first multi-CVE AI-assisted contribution to a major browser security advisory.

CVE IDVulnerability DescriptionSeverityReporter
CVE-2026-4684Race condition, use-after-freeHighOskar L
CVE-2026-4685Incorrect boundary conditionsHighSajeeb Lohani
CVE-2026-4686Incorrect boundary conditionsHighSajeeb Lohani
CVE-2026-4687Sandbox escape via incorrect boundary conditionsHighSajeeb Lohani
CVE-2026-4688Sandbox escape via use-after-freeHighSajeeb Lohani
CVE-2026-4689Sandbox escape via incorrect boundary conditions, integer overflowHighSajeeb Lohani
CVE-2026-4690Sandbox escape via incorrect boundary conditions, integer overflowHighSajeeb Lohani
CVE-2026-4691Use-after-freeHighFabius Artrel
CVE-2026-4692Sandbox escapeHighTom Ritter
CVE-2026-4693Incorrect boundary conditionsHighSajeeb Lohani
CVE-2026-4694Incorrect boundary conditions, integer overflowHighSajeeb Lohani
CVE-2026-4695Incorrect boundary conditionsHighAtte Kettunen
CVE-2026-4696Use-after-freeHighSota Wada
CVE-2026-4697Incorrect boundary conditionsHighLorenzo
CVE-2026-4698JIT miscompilationHighmaxpl0it (Trend Micro ZDI)
CVE-2026-4699Incorrect boundary conditionsHighMatej Smycka
CVE-2026-4720Memory safety bugs (memory corruption / arbitrary code execution)HighChristian Holler, Gabriele Svelto, Tom Schuster & Mozilla Fuzzing Team
CVE-2026-4729Memory safety bugs (memory corruption / arbitrary code execution)HighChristian Holler, Fatih Kilic, Tom Schuster & Mozilla Fuzzing Team
CVE-2026-4721Memory safety bugs (memory corruption / arbitrary code execution)HighChristian Holler, Timothy Nikkel, Tom Schuster & Mozilla Fuzzing Team
CVE-2026-4700Mitigation bypassModeratepizzahunthack1
CVE-2026-4701Use-after-freeModerateGary Kwong
CVE-2026-4722Privilege escalationModerateNika Layzell
CVE-2026-4702JIT miscompilationModerateBen Asher et al. (via Claude/Anthropic)
CVE-2026-4723Use-after-freeModerateBen Asher et al. (via Claude/Anthropic)
CVE-2026-4724Undefined behaviorModerateBen Asher et al. (via Claude/Anthropic)
CVE-2026-4704Denial of serviceModerateBen Asher et al. (via Claude/Anthropic)
CVE-2026-4705Undefined behaviorModerateBen Asher et al. (via Claude/Anthropic)
CVE-2026-4706Incorrect boundary conditionsModerateJun Yang
CVE-2026-4707Incorrect boundary conditionsModerateSajeeb Lohani
CVE-2026-4708Incorrect boundary conditionsModerateSajeeb Lohani
CVE-2026-4709Incorrect boundary conditionsModerateSajeeb Lohani
CVE-2026-4710Incorrect boundary conditionsModerateSajeeb Lohani
CVE-2026-4711Use-after-freeModerateJosh Aas
CVE-2026-4725Sandbox escape via use-after-freeModerateJun Yang
CVE-2026-4712Information disclosureModerateJosh Aas
CVE-2026-4713Incorrect boundary conditionsModerateSajeeb Lohani
CVE-2026-4714Incorrect boundary conditionsModerateSajeeb Lohani
CVE-2026-4715Uninitialized memoryModerateJun Yang
CVE-2026-4716Incorrect boundary conditions, uninitialized memoryModeratePwn2addr
CVE-2026-4717Privilege escalationModerateSatoki Tsuji
CVE-2026-4726Denial of serviceLowHanno Boeck
CVE-2025-59375Denial of serviceLowJan Horak
CVE-2026-4727Denial of serviceLowCody
CVE-2026-4728SpoofingLowAswinkumar Gokulakannan
CVE-2026-4718Undefined behaviorLowBen Asher et al. (via Claude/Anthropic)
CVE-2026-4719Incorrect boundary conditionsLowSajeeb Lohani

The moderate-severity tier features a broad range of issues across the Canvas2D, Graphics, Audio/Video, and JavaScript Engine components. CVE-2026-4725 is a sandbox escape via use-after-free in the Canvas2D component, reported by Jun Yang.

CVE-2026-4717 allows privilege escalation in the Netmonitor component, discovered by Satoki Tsuji. Low-severity fixes include denial-of-service bugs in the XML and NSS libraries (CVE-2026-4726, CVE-2025-59375, CVE-2026-4727) and a spoofing issue in the Privacy: Anti-Tracking component (CVE-2026-4728), reported by Aswinkumar Gokulakannan.

Affected Versions and Mitigation

All vulnerabilities affect Firefox versions prior to 149. Firefox ESR 140.9 and Firefox ESR 115.34 also received corresponding patches for a subset of these flaws. Users are strongly advised to update to Firefox 149 immediately via the browser’s built-in updater or by downloading directly from Mozilla’s official website.

Organizations managing enterprise deployments should prioritize patching, given the presence of multiple sandbox-escape and remote-code-execution vectors in this release.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Firefox 149 Released With Patch for 37 Vulnerabilities that Enables Remote Attacks appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading